Handala×éÖ¯Ðû³Æ¶Ô°¢ÁªÇõ·¢ÆðÖØ´óÍøÂç¹¥»÷

°ä²¼¹¦·ò 2026-04-15

1. Handala×éÖ¯Ðû³Æ¶Ô°¢ÁªÇõ·¢ÆðÖØ´óÍøÂç¹¥»÷


4ÔÂ13ÈÕ£¬ÃûΪHandalaµÄºÚ¿Í×éÖ¯½üÈÕÐû³Æ¶Ô°¢ÁªÇõ·¢ÆðÁËÒ»´ÎÖØ´óÍøÂç¹¥»÷£¬Ö¸±êÔ̺¬µÏ°Ý·¨Ôº²¿ÃÅ¡¢µÏ°ÝµØÆ¤²¿Ãź͵ϰÝ·Ïß½»Í¨ÖÎÀí¾Ö¡£¸Ã×éÖ¯Ðû³ÆÏú»ÙÁË6PBµÄÊý¾Ý£¬ÇÔÈ¡ÁË149TBµÄÃô¸ÐÐÅÏ¢£¬²¢½«Õâ´Î¹¥»÷¶¨ÐÔΪ¶ÔµØÓòµ±¾ÖµÄ±¨³ðºÍÖҸ档HandalaÔÚÆäTorÍøÕ¾ÉϰµÊ¾£º¡°¼øÓÚ°¢ÁªÇõ¸¨µ¼È˹«¿ª±ä½ÚµÖ¿¹ÖáÐÄ£¬²¢×÷Ϊ¶Ô¸ÃµØÓòËùÓÐÅѹúµ±¾ÖµÄ¶ËׯÏÈ·¢ÖÆÈËÖҸ棬ºº´ïÀ­×éÖ¯ÒѶԸùú¹Ø¼ü»ù´¡ÉèÊ©·¢ÆðÁËÆù½ñΪֹÍþÁ¦×î׳´óµÄÍøÂç¹¥»÷Ö®Ò»¡£ÔÚÕâ´ÎÐж¯ÖУ¬6PBµÄÊý¾ÝÒѱ»³¹µ×Ïú»Ù¡£¡£¡±Ä¿Ç°ÕâЩ˵·¨ÉÐδµÃµ½¶ÀÁ¢Ö¤Êµ¡£HandalaÀíÂÛÉÏÊÇÒ»¸öÖ§³Ö°ÍÀÕ˹̹µÄºÚ¿Í×éÖ¯£¬µ«ÆÕ±éÒÔΪËüÊÇÒÁÀÊÖ§³ÖµÄVoid ManticoreµÄ»Ï×Ó¡£¸Ã×éÖ¯ÒÔÍøÂç´¹µö¡¢Êý¾ÝÇÔÈ¡¡¢ÀÕË÷ºÍ·ÛËéÐÔ²Á³ý¹¥»÷¶øÎÅÃû£¬Í¬Ê±´ÓÊÂÐÅÏ¢Õ½ºÍÉúÀíÕ½¡£×ÔÒÁÀÊì¶Ü·¢×÷ÒÔÀ´£¬¸Ã×éÖ¯Ò»ÏòÒÔÒÔÉ«Áоü·½·þÎñÆ÷¡¢µý±¨ÈËÔ±ºÍ¹«Ë¾ÎªÖ¸±ê£¬ÇÔÈ¡»ò²Á³ýÊý¾Ý¡£


https://securityaffairs.com/190716/hacking/iran-linked-group-handala-claims-to-have-breached-three-major-uae-organizations.html


2. KrakenÔâÄÚ²¿ÍþвÀÕË÷£¬»Ø¾øÖ§¸¶Êê½ð


4ÔÂ14ÈÕ£¬¼ÓÃÜÇ®±ÒÂòÂôËùKraken½üÈÕÅû¶£¬Ò»¸öÍøÂç·¸×ïÍÅ»ïÕýÊÔͼͨ¹ýÍþв°ä²¼ÏÔʾÍйܿͻ§Êý¾ÝµÄÄÚ²¿ÏµÍ³ÊÓÆµÀ´Ú²Æ­¸Ã¹«Ë¾¡£KrakenÊ×ϯ°²È«¹ÙÄá¿Ë¡¤Åå¶û¿Æ¿Æ°µÊ¾£¬¸ÃÊÂÎñ²¢Î´Î£¼°¿Í»§×ʽ𣬶øÊÇÉæ¼°ÄÚ²¿Íþв£¬ÆäÖÐÁ½ÃûÖ§³ÖÈËÔ±²»µ±½Ó¼ûÁËÓÐÏ޵Ŀͻ§Êý¾Ý¡£KrakenÃ÷È·°µÊ¾²»»áÏòÍþвÐÐΪÕßÖ§¸¶ÈκÎÓöȻò½øÐÐÈκν»Éæ¡£2025Äê2Ô£¬KrakenÊÕµ½¡°À´×Ô¿¿µÃסÆðÔ´µÄÏßË÷¡±£¬³ÆÍøÂç·¸×ï·Ö×ÓÉ¢²¼ÁËÒ»¶ÎÊÓÆµ£¬ÑÝʾÈôºÎ½Ó¼ûÆä¿Í»§Ö§³Öϵͳ¡£Ëæºó·¢Õ¹µ÷²é£¬·¢ÏÖÒ»ÃûÖ§³ÖÈËÔ±±»¸ÃÍþвÐÐΪÕßÕÐļ¡£×î½ü£¬KrakenÔÙ´ÎÊÕµ½Ïß±¨£¬³ÆÓÐÒ»¶Î¸üеÄÊÓÆµÏÔʾÓÐÈËÄܹ»½Ó¼ûÆäϵͳµÄÄÚ²¿È¨ÏÞ¡£ÔÚÁ½ÆðÊÂÎñÖУ¬¹«Ë¾¶¼Ñ¸ËÙ×ö³ö·´Ó³£¬³·ÏúÁËÉæÊÂÔ±¹¤µÄ½Ó¼ûȨÏÞ£¬·¢Õ¹µ÷²é²¢¼ÓÇ¿¹Ü¿Ø´ëÊ©¡£Èç·¢ÏÖÓû§Êý¾Ýй¶£¬Kraken»áÖ±½Ó֪ͨÊÜÓ°ÏìµÄÓû§¡£¾ÝÅå¶û¿Æ¿Æ³Æ£¬Õâ´ÎÊÂÎñ½öÓ°ÏìÔ¼2000¸öÕË»§£¬Õ¼KrakenÓû§×ÜÊýµÄ0.02%£¬Ð¹Â¶µÄÐÅÏ¢½öÉæ¼°¿Í»§Ö§³ÖÊý¾Ý¡£Kraken°µÊ¾Æäµ÷²éÒÑÍøÂçµ½×ã¹»µÄÖ¤¾Ý£¬Äܹ»ÒÀ·¨¸æ×´ËùÓÐÊÔͼÀÕË÷ËûÃǵÄÉæ°¸ÈËÔ±£¬¹«Ë¾ÕýÔÚÓë¶à¸ö˾·¨¹ÜÏ½ÇøµÄÁª°î·¨Âɲ¿ÃÅÇ×êǺÏ×÷¡£


https://www.bleepingcomputer.com/news/security/crypto-exchange-kraken-extorted-by-hackers-after-insider-breach/


3. ChromeÉ̵êÏÖ³¬100¸ö¶ñÒâÀ©´ó


4ÔÂ14ÈÕ£¬¹Ù·½ChromeÍøÉÏÀûÓÃÉ̵êÖз¢ÏÖÁ˳¬¹ý100¸ö¶ñÒâÀ©´ó·¨Ê½£¬ÕâЩÀ©´óÊÔͼÇÔÈ¡Google OAuth2 BearerÁîÅÆ¡¢²¿ÊðºóÃŲ¢½øÐиæ°×ڲƭ¡£ÀûÓð²È«¹«Ë¾SocketµÄ×êÑÐÈËÔ±·¢ÏÖ£¬ÕâЩ¶ñÒâÀ©´óÊÇʹÓÃÒ»ÑùºÅÁîÓë½ÚÖÆ£¨C2£©»ù´¡ÉèÊ©µÄЭͬ¹¥»÷»î¶¯µÄÒ»²¿ÃÅ¡£ÍþвÐÐΪÕßÒÔÎå¸ö·ÖÆçµÄ°ä²¼ÕßÉí·ÝÔÚ¶à¸öÀà±ðÖа䲼ÁËÕâЩÀ©´ó£¬Ô̺¬Telegram²à±ßÀ¸¿Í»§¶Ë¡¢ÀÏ»¢»úºÍ»ùŵÓÎÏ·¡¢YouTubeºÍTikTok¼ÓÇ¿Æ÷¡¢Îı¾·­Ò빤¾ßºÍʵÓ÷¨Ê½¡£×êÑÐÈËÔ±°µÊ¾£¬¸Ã¹¥»÷»î¶¯Ê¹ÓÃÍйÜÔÚContabo VPSÉϵÄÖÐÑëºó¶Ë£¬¶à¸ö×ÓÓò±ðÀë´¦Öòǻ°½Ù³Ö¡¢Éí·ÝÍøÂç¡¢ºÅÁîÖ´ÐкÍÇ®±Ò»¯²Ù×÷¡£Socketƾ¾ÝÉí·ÝÑéÖ¤ºÍ»á»°ÇÔÈ¡´úÂëÖеÄ×¢½â£¬·¢ÏÖÁËÅú×¢´æÔÚ¶íÂÞ˹¶ñÒâÈí¼þ¼´·þÎñ²Ù×÷µÄÖ¤¾Ý¡£ÔÚÊý¾Ý²É¼¯ºÍÕË»§½Ù³Ö·½Ã棬×î´óµÄ¼¯ÈºÔ̺¬78¸öÀ©´ó·¨Ê½£¬Í¨¹ýinnerHTMLÊôÐÔ½«¹¥»÷Õß½ÚÖÆµÄHTML×¢Èëµ½Óû§½çÃæÖС£µÚ¶þ´ó×éÔ̺¬54¸öÀ©´ó·¨Ê½£¬ÍøÂçÊܺ¦Õߵĵç×ÓÓʼþ¡¢ÐÕÃû¡¢Ð¡ÎÒ×ÊÁÏͼƬºÍGoogleÕÊ»§ID£¬Í¬Ê±ÇÔÈ¡Google OAuth2 BearerÁîÅÆ¡£µÚÈýÅú45¸öÀ©´ó·¨Ê½Ô̺¬Ò»¸ö°µ²ØÖ°ÄÜ£¬¸ÃÖ°ÄÜÔÚä¯ÀÀÆ÷Æô¶¯Ê±ÔËÐУ¬³äÈκóÃÅ£¬´ÓC2·þÎñÆ÷»ñÈ¡ºÅÁî²¢´ò¿ªËÁÒâURL£¬ÎÞÐèÓû§½»»¥¼´¿ÉÆô¶¯¡£


https://www.bleepingcomputer.com/news/security/over-100-chrome-extensions-in-web-store-target-users-accounts-and-data/


4. SalesforceÅäÖÃÃýÎóÖÂMcGraw-HillÊý¾Ýй¶


4ÔÂ14ÈÕ£¬½ÌÓý¾ÞÍ·McGraw-Hill½üÈÕ֤ʵ£¬ÒòSalesforceÅäÖÃÃýÎ󣬺ڿͳɹ¦½Ó¼ûÁËÆäÄÚ²¿Êý¾Ý¡£McGraw-Hill½²»°È˰µÊ¾£¬Î´¾­ÊÚȨµÄ½Ó¼ûËÆºõÔ´ÓÚSalesforce»·¾³ÅäÖÃÃýÎó£¬ÕâÊÇÒÑÓ°Ïì¶à¼ÒÓëSalesforceºÏ×÷µÄ×éÖ¯µÄ¸ü¿í·ºÎÊÌâµÄÒ»²¿ÃÅ¡£¹«Ë¾²¹³äµÀ£¬Õâ²»Éæ¼°¶ÔÆäSalesforceÕÊ»§¡¢¿Í»§Êý¾Ý¿â¡¢¿Î¼þ»òÄÚ²¿ÏµÍ³µÄδ¾­ÊÚȨ½Ó¼û¡£ÔÚÍâ²¿ÍøÂ簲ȫר¼ÒЭÖúÏ£¬µ÷²éÏÔʾй¶ÐÅÏ¢²»º¬Éç»á±£ÏÕºÅÂë¡¢²ÆÕþÕË»§ÐÅÏ¢»òÀ´×ÔÆä½ÌÓýƽ̨µÄѧÉúÊý¾Ý¡£´Ë·¬ÉêÃ÷°ä²¼Ç°£¬ÀÕË÷×éÖ¯ShinyHuntersÔÚÆä°µÍøÃÅ»§Éϰ䷢McGraw-Hill³ÉΪÊܺ¦Õߣ¬²¢Íþв³Æ³ý·ÇÖ§¸¶Êê½ð£¬²»È»½«ÔÚ4ÔÂ14ÈÕǰй¶±»µÁÊý¾Ý¡£¸ÃÍþвÐÐΪÕßÐû³Æ°ÑÎÕÁË4500ÍòÌõSalesforce¼Í¼£¬ÆäÖÐÔ̺¬Ð¡ÎÒÉí·ÝÐÅÏ¢£¬ÕâÓ빫˾Ðû³ÆÊý¾Ý²»Ãô¸ÐµÄ˵·¨Ïàì¶Ü¡£McGraw-Hill°µÊ¾£¬¼ì²âµ½Î´¾­ÊÚȨ»î¶¯ºó£¬ÊÜÓ°ÏìµÄÍøÒ³ÒÑÁ¢¼´µÃµ½±£»¤£¬¹«Ë¾ÕýÓëSalesforceÇ×êǺÏ×÷ÒÔ½øÒ»²½¼ÓÇ¿±£»¤´ëÊ©¡£


https://www.bleepingcomputer.com/news/security/mcgraw-hill-confirms-data-breach-following-extortion-threat/


5. ³ÉÈËÒ¹×Ü»á¾ÞÍ·RCI HospitalityÊý¾Ýй¶


4ÔÂ14ÈÕ£¬³ÉÈËÒ¹×Ü»á¾ÞÍ·RCI Hospitality Holdings½üÈÕÅû¶ÁËÒ»Â·ÍøÂ簲ȫÊÂÎñ£¬µ¼ÖÂÃô¸ÐСÎÒÐÅϢй¶¡£Æ¾¾ÝÃÀ¹ú֤ȯÂòÂôίԱ»áµÄÎļþ£¬¸Ã¹«Ë¾ÆìÏÂ×Ó¹«Ë¾RCI Internet ServicesÓÚ3ÔÂ23ÈÕ·¢ÏÖ£¬ÆäIIS Web·þÎñÆ÷ÖдæÔÚ²»°²È«µÄÖ±½Ó¶ÔÏóÒýÓ÷ì϶£¬µ¼ÖÂСÎÒÐÅÏ¢Ô⵽δ¾­ÊÚȨ½Ó¼û¡£±¾Ô³õʵÏֵĵ÷²éÏÔʾ£¬¸ÃÊÂÎñÏÖʵʼÓÚ3ÔÂ19ÈÕ¡£RCI°µÊ¾£¬Õâ´ÎÊý¾ÝÐ¹Â¶Éæ¼°¶Ô¡°Öڶࡱ¶ÀÁ¢³Ð°üÉÌÐÅÏ¢µÄδ¾­ÊÚȨ½Ó¼û£¬Ô̺¬ËûÃǵÄÐÕÃû¡¢µ®ÉúÈÕÆÚ¡¢ÁªÏµ·½Ê½¡¢Éç»á±£ÏÕºÅÂëºÍ¼ÝÊ»ÅÆÕÕºÅÂë¡£¹«Ë¾ÏòSECÇ¿µ÷£¬¾ÝÆäËùÖª£¬Î´¾­ÊÚȨµÄÐÐΪÕßÉÐδ¹«¿ª´«²¼ÕâЩÊý¾Ý£¬Í¬Ê±¿Í»§ÐÅÏ¢ºÍ²ÆÕþϵͳ¾ùδ±»½Ó¼û¡£RCI»¹Ö¸³ö£¬ÆäÒµÎñÔËӪδÊÜÓ°Ï죬²¢ÒÔΪ¸ÃÊÂÎñ²»»á¶Ô¹«Ë¾²úÉúÄÚÈÝÐÔÓ°Ï졣ĿǰÉв»Ã÷ÏÔ¾ßÌåÊÜÓ°ÏìÈËÊý£¬µ«RCI HospitalityÊÇÃÀ¹ú×î´óµÄ³ÉÈËÒ¹×Ü»áÔËÓªÉÌÖ®Ò»£¬ÆìÏÂÓµº±¼ûÊ®¼ÒÃŵ꣬Ô̺¬Rick'sºÍTootsie'sµÈÆ·ÅÆ£¬ÒµÎñ×éºÏ»¹º­¸ÇÌåÓý¾Æ°ÉºÍÎèÌü¡£Ä¿Ç°ÉÐÎÞÒÑÖªµÄÍøÂç·¸×ï×éÖ¯Ðû³Æ¶ÔÕâ´Î¹¥»÷ÕÆ¹Ü¡£


https://www.securityweek.com/nightclub-giant-rci-hospitality-reports-data-breach/


6. ShowDocÑÏÖØ·ì϶CVE-2025-0520Ôâ»ý¼«ÀûÓÃ


4ÔÂ14ÈÕ£¬ÔÚ¹ãÊÜ»¶Ó­µÄÎĵµÖÎÀíºÍºÏ×÷·þÎñShowDocÖУ¬Ò»¸öÑÏÖØ°²È«·ì϶Òѱ»¹¥»÷Õß»ý¼«ÀûÓ᣸÷ì϶±àºÅΪCVE-2025-0520£¬CVSSÆÀ·ÖΪ9.4·Ö£¬ÊôÓÚÑÏÖØ¼¶±ð¡£·ìÏ¶Éæ¼°²»ÊÜÏ޶ȵÄÎļþÉÏ´«ÎÊÌ⣬ԴÓÚ¶ÔÎļþÀ©´óÃûµÄÑéÖ¤²»µ±£¬Ê¹µÃ¹¥»÷Õß¿ÉÄÜÉÏ´«ËÁÒâPHPÎļþ²¢ÊµÏÖÔ¶³Ì´úÂëÖ´ÐС£¾ÝVulhub°ä²¼µÄ°²È«²¼¸æ£¬ÔÚShowDoc 2.8.7֮ǰµÄ°æ±¾ÖдæÔÚ´ËÎÊÌ⣬¹¥»÷Õß¿ÉÄÜÉÏ´«web shell²¢ÔÚ·þÎñÆ÷ÉÏÖ´ÐÐËÁÒâ´úÂë¡£¸Ã·ì϶ÒÑÔÚShowDoc°æ±¾2.8.7Öеõ½ÐÞ¸´£¬¸Ã°æ±¾ÓÚ2020Äê10Ô°䲼£¬¶øÈí¼þÈ·µ±Ç°°æ±¾Îª3.8.1¡£Æ¾¾ÝVulnCheck°²È«×êÑи±×ܲÃCaitlin Condon·ÖÏíµÄ×îÐÂϸ½Ú£¬CVE-2025-0520Òѳõ´ÎÔâµ½»ý¼«ÀûÓá£ÒÑ·¢ÏֵĹ¥»÷¼¿Á©ÊÇÀûÓø÷ì϶ÏòλÓÚÃÀ¹úµÄÃÛ¹ÞͶ·ÅWeb Shell£¬¸ÃÃÛ¹ÞÔËÐÐ×Å´æÔÚ·ì϶µÄShowDoc°æ±¾¡£ÓйØÊý¾ÝÏÔʾ£¬Ä¿Ç°Óг¬¹ý2000¸öShowDocʵÀýÔÚÏߣ¬ÆäÖдó²¿ÃÅλÓÚÖйú¡£½¨ÒéʹÓÃShowDocµÄÓû§¸üÐÂÖÁ×îа汾ÒÔ»ñµÃ×î¼Ñ·À»¤¡£


https://thehackernews.com/2026/04/showdoc-rce-flaw-cve-2025-0520-actively.html